Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. How many seconds would it take to break your password?

How many seconds would it take to break your password?

Scheduled Pinned Locked Moved The Insider News
comsecurityquestion
30 Posts 12 Posters 2 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A atbennett

    Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check the list below and see who big a difference between a few billion possible combinations a few sextillion possibilities really is. [ITworld]

    E Offline
    E Offline
    ed welch
    wrote on last edited by
    #6

    just increase the delay everytime a wrong password is entered, then it can't be hacked

    RaviBeeR 1 Reply Last reply
    0
    • A AspDotNetDev

      I wonder if this takes into account Moore's Law (if we are able to sustain that as time goes on) and quantum computing. After 50 years, computers will be something like a million to a billion times faster, and so will be able to crack passwords much faster.

      Thou mewling ill-breeding pignut!

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #7

      By then I would think 'passwords' as we know them will be obsolete. We can already have systems process your face agaisnt 250 mil in under a second, we can even combine that with IR imaging. Honestly who knows what some crazy genologist/crytpologist/biologist.../ist will come up with. My theory is someday the system will just know you are you. The only way to fake it would be to knock you out and have you sit in front of it strung up like pinochio. And heck even then the system may dedect you are under durress and call the goon squad for ya. Keep in mind there is always other technology that is advancing due to Moore's law right along side of computation. They are not advancing directly because of it which creates a crazy exponential growth of tech because of the indirect connects between the fields.

      Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet.

      L 1 Reply Last reply
      0
      • P PIEBALDconsult

        That assumes that the policy is enforced and that the attacker knows the policy. If the policy is a minimum of eight characters, at least one uppercase, at least one lowercase, at least one digit, and at least one symbol and the attacker knows this (a reasonable assumption) then he won't try anything outside those parameters and will therefore reduce his efforts. On the other hand, if it's not enforced then he'll never guess that my password is "badger". :cool: In my opinion, allowing and recommending a wide variety of characters is a good idea, but requiring a wide variety of characters is not. Make the attacker search the largest haystack you can; don't limit it.

        L Offline
        L Offline
        lewax00
        wrote on last edited by
        #8

        PIEBALDconsult wrote:

        On the other hand, if it's not enforced then he'll never guess that my password is "badger".

        A dictionary attack would be able to get that pretty easily still, and that's likely to be one of their first attempts.

        P 1 Reply Last reply
        0
        • L lewax00

          PIEBALDconsult wrote:

          On the other hand, if it's not enforced then he'll never guess that my password is "badger".

          A dictionary attack would be able to get that pretty easily still, and that's likely to be one of their first attempts.

          P Online
          P Online
          PIEBALDconsult
          wrote on last edited by
          #9

          No, if the attacker expects the password to have digits and symbols then he won't try anything without them.

          L 1 Reply Last reply
          0
          • E ed welch

            just increase the delay everytime a wrong password is entered, then it can't be hacked

            RaviBeeR Offline
            RaviBeeR Offline
            RaviBee
            wrote on last edited by
            #10

            ...or disable the account after n consecutive login failures.  Pretty standard stuff.  IMHO the article is more hype than not. /ravi

            My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

            P L 2 Replies Last reply
            0
            • A AspDotNetDev

              Yeah, most of my passwords for relatively unimportant stuff are 10-20 characters. I think the longest password I know by heart is around 50 characters long. :-D

              Thou mewling ill-breeding pignut!

              P Online
              P Online
              PIEBALDconsult
              wrote on last edited by
              #11

              AspDotNetDev wrote:

              50 characters long

              I'd just copy and paste from Notepad -- from my Passwords.txt file. :rolleyes:

              A 1 Reply Last reply
              0
              • RaviBeeR RaviBee

                ...or disable the account after n consecutive login failures.  Pretty standard stuff.  IMHO the article is more hype than not. /ravi

                My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

                P Online
                P Online
                PIEBALDconsult
                wrote on last edited by
                #12

                Ravi Bhavnani wrote:

                disable the account after n consecutive login failures

                X| That causes too much trouble.

                RaviBeeR 1 Reply Last reply
                0
                • P PIEBALDconsult

                  AspDotNetDev wrote:

                  50 characters long

                  I'd just copy and paste from Notepad -- from my Passwords.txt file. :rolleyes:

                  A Offline
                  A Offline
                  AspDotNetDev
                  wrote on last edited by
                  #13

                  I used to do something like that. Now I use KeePass. It's too much trouble to remember hundreds of passwords.

                  Thou mewling ill-breeding pignut!

                  L 1 Reply Last reply
                  0
                  • P PIEBALDconsult

                    Ravi Bhavnani wrote:

                    disable the account after n consecutive login failures

                    X| That causes too much trouble.

                    RaviBeeR Offline
                    RaviBeeR Offline
                    RaviBee
                    wrote on last edited by
                    #14

                    Right.  But some systems also offer a security policy to auto-reenable disabled accounts after m units of time have elapsed since the last perceived dictionary attack. /ravi

                    My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

                    1 Reply Last reply
                    0
                    • P PIEBALDconsult

                      No, if the attacker expects the password to have digits and symbols then he won't try anything without them.

                      L Offline
                      L Offline
                      lewax00
                      wrote on last edited by
                      #15

                      But if its not enforced most people will choose not to use them, so I still think he'd try that first, especially because it would be relatively fast (I think I read somewhere English has around 600,000 words or something like that, so even at only 1000 per second that's like 10 minutes, and it works for many people's passwords). Which is of course why my secure password is utter gibberish with no meaning to anyone existing outside my head. (And the people inside my head can't get to computers so no worries there.)

                      1 Reply Last reply
                      0
                      • RaviBeeR RaviBee

                        ...or disable the account after n consecutive login failures.  Pretty standard stuff.  IMHO the article is more hype than not. /ravi

                        My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

                        L Offline
                        L Offline
                        lewax00
                        wrote on last edited by
                        #16

                        That works for stuff like websites, but what about something like an encrypted file? There's not much you can do to prevent a brute force attack on those.

                        RaviBeeR P 2 Replies Last reply
                        0
                        • L lewax00

                          That works for stuff like websites, but what about something like an encrypted file? There's not much you can do to prevent a brute force attack on those.

                          RaviBeeR Offline
                          RaviBeeR Offline
                          RaviBee
                          wrote on last edited by
                          #17

                          You're absolutely correct.  :thumbsup: 5+  I was thinking service oriented apps. /ravi

                          My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

                          1 Reply Last reply
                          0
                          • A atbennett

                            Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check the list below and see who big a difference between a few billion possible combinations a few sextillion possibilities really is. [ITworld]

                            K Offline
                            K Offline
                            Kevin Drzycimski
                            wrote on last edited by
                            #18

                            the link says, that using a bigger alphabet is more secure, but this is just plain wrong it is better to increase the number of characters, even, if they are simple (lowercase letters) simple math: say 'k' is the size of your alphabet and 'n' shall be the size of your password. then there are k^n possibilities. increasing n is much more valueble than increasing k. just try it out: f = @(n,k) k^n; f(6,40) = 4.0960e+09 f(6,41) = 4.7501e+09 f(7,40) = 1.6384e+11 f(10,60) = 6.0466e+17 f(10,61) = 7.1334e+17 f(11,60) = 3.6280e+19 f(20,60) = 3.6562e+35 f(20,61) = 5.0886e+35 f(21,60) = 2.1937e+37 as you see, increasing the first parameter (length) makes like 100 times more possibilites, while adding one more symbol is like not even doubling. so, a good password is a passphrase, take 3-5 random (and easy to remember) words and stick them together. the idea to use passphrases came from http://xkcd.com/936/[^]

                            P A 2 Replies Last reply
                            0
                            • K Kevin Drzycimski

                              the link says, that using a bigger alphabet is more secure, but this is just plain wrong it is better to increase the number of characters, even, if they are simple (lowercase letters) simple math: say 'k' is the size of your alphabet and 'n' shall be the size of your password. then there are k^n possibilities. increasing n is much more valueble than increasing k. just try it out: f = @(n,k) k^n; f(6,40) = 4.0960e+09 f(6,41) = 4.7501e+09 f(7,40) = 1.6384e+11 f(10,60) = 6.0466e+17 f(10,61) = 7.1334e+17 f(11,60) = 3.6280e+19 f(20,60) = 3.6562e+35 f(20,61) = 5.0886e+35 f(21,60) = 2.1937e+37 as you see, increasing the first parameter (length) makes like 100 times more possibilites, while adding one more symbol is like not even doubling. so, a good password is a passphrase, take 3-5 random (and easy to remember) words and stick them together. the idea to use passphrases came from http://xkcd.com/936/[^]

                              P Online
                              P Online
                              PIEBALDconsult
                              wrote on last edited by
                              #19

                              Kevin Drzycimski wrote:

                              it is better to increase the number of characters

                              Yes, that's true too. :thumbsup:

                              1 Reply Last reply
                              0
                              • L lewax00

                                That works for stuff like websites, but what about something like an encrypted file? There's not much you can do to prevent a brute force attack on those.

                                P Online
                                P Online
                                PIEBALDconsult
                                wrote on last edited by
                                #20

                                lewax00 wrote:

                                an encrypted file

                                And encrypt at least twice. :cool:

                                1 Reply Last reply
                                0
                                • A AspDotNetDev

                                  I used to do something like that. Now I use KeePass. It's too much trouble to remember hundreds of passwords.

                                  Thou mewling ill-breeding pignut!

                                  L Offline
                                  L Offline
                                  lewax00
                                  wrote on last edited by
                                  #21

                                  I use LastPass's random password generation for most websites. I can't think of a more secure password - nobody knows it, not even me! :laugh: And of course I use my longest most secure password (that I can remember) is on my LastPass account so I don't have an obvious weak point there.

                                  1 Reply Last reply
                                  0
                                  • L Lost User

                                    By then I would think 'passwords' as we know them will be obsolete. We can already have systems process your face agaisnt 250 mil in under a second, we can even combine that with IR imaging. Honestly who knows what some crazy genologist/crytpologist/biologist.../ist will come up with. My theory is someday the system will just know you are you. The only way to fake it would be to knock you out and have you sit in front of it strung up like pinochio. And heck even then the system may dedect you are under durress and call the goon squad for ya. Keep in mind there is always other technology that is advancing due to Moore's law right along side of computation. They are not advancing directly because of it which creates a crazy exponential growth of tech because of the indirect connects between the fields.

                                    Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet.

                                    L Offline
                                    L Offline
                                    lewax00
                                    wrote on last edited by
                                    #22

                                    Collin Jasnoch wrote:

                                    Honestly who knows what some crazy genologist/crytpologist/biologist.../ist will come up with.

                                    I think I'm going to go invent cryptobiology now. Nevermind, a Google search gave me about 60,000 results for that word...I need to think of something even more obscure...

                                    1 Reply Last reply
                                    0
                                    • A atbennett

                                      Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check the list below and see who big a difference between a few billion possible combinations a few sextillion possibilities really is. [ITworld]

                                      P Online
                                      P Online
                                      PIEBALDconsult
                                      wrote on last edited by
                                      #23

                                      It occurred to me that an organization could have a system constantly trying to break everyone's passwords -- anyone whose password is broken gets some sort of punishment (along with having to change the password).

                                      A 1 Reply Last reply
                                      0
                                      • A atbennett

                                        Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check the list below and see who big a difference between a few billion possible combinations a few sextillion possibilities really is. [ITworld]

                                        OriginalGriffO Offline
                                        OriginalGriffO Offline
                                        OriginalGriff
                                        wrote on last edited by
                                        #24

                                        Now, that is a good question. My cat has a Codeproject account, and as is my norm these days, his password is a Guid. (Because I can paste it from my encrypted password store on the PC) How long to break it?

                                        Massive Cracking Array Scenario:
                                        (Assuming one hundred trillion guesses per second) 5.10 million trillion trillion trillion centuries

                                        My password is not a Guid (because I have to enter it from the keyboard on my phone occasionally) How long to break it?

                                        Massive Cracking Array Scenario:
                                        (Assuming one hundred trillion guesses per second) 0.000202 seconds

                                        Maybe I should find a way to remember Guids? :laugh:

                                        Ideological Purity is no substitute for being able to stick your thumb down a pipe to stop the water

                                        "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                                        "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                                        P B 2 Replies Last reply
                                        0
                                        • OriginalGriffO OriginalGriff

                                          Now, that is a good question. My cat has a Codeproject account, and as is my norm these days, his password is a Guid. (Because I can paste it from my encrypted password store on the PC) How long to break it?

                                          Massive Cracking Array Scenario:
                                          (Assuming one hundred trillion guesses per second) 5.10 million trillion trillion trillion centuries

                                          My password is not a Guid (because I have to enter it from the keyboard on my phone occasionally) How long to break it?

                                          Massive Cracking Array Scenario:
                                          (Assuming one hundred trillion guesses per second) 0.000202 seconds

                                          Maybe I should find a way to remember Guids? :laugh:

                                          Ideological Purity is no substitute for being able to stick your thumb down a pipe to stop the water

                                          P Online
                                          P Online
                                          PIEBALDconsult
                                          wrote on last edited by
                                          #25

                                          But it's the policy that matters, not the actual password. You and your cat both have passwords within the same policy (CP's policy) so an attacker has exactly the same difficulty in breaking either.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups